Why Cybersecurity Matters

Small manufacturers are a vital part of our nation’s economic and cyber infrastructure. There are over 289,000 small manufacturers in the U.S. In 2015, the average cost of a data breach for small companies was $38,000. It has been estimated that more than half of the companies go out of business within six months of a cyber attack. For most small manufacturers, the security of your information, systems, and networks is not the highest priority given everything else you’re faced with. But an information security or cybersecurity incident can be detrimental to the business, your customers, partners, or suppliers. It’s important that manufacturers understand and manage the risk and establish a cybersecurity protocol to protect your most critical assets.

Five Steps to Reduce Cyber Risks

This resource is for small manufacturers to quickly and cost effectively address cybersecurity threats. These simple, low cost steps are based on the official NIST guidance from the Cybersecurity Framework and have been tailored to meet the needs of small companies so they can identify, assess and manage cybersecurity risks.

Cybersecurity Framework Steps for Manufacturers


Tools & Steps to Get Started with Cybersecurity

Catalyst Connection’s team has designed a comprehensive four-step cybersecurity program. We will help gauge your current situation for a manufacturing client and tailor a plan specifically for the internal capabilities, budget and time sensitivity. Here’s how it works:

  • Step 1: Discovery – the professional assessment of a company’s practices related to the new standard. If necessary, a gap analysis will be completed to document the scope to be remediated.
  • Step 2: Remediate to Meet New Standard – supports all necessary fixes to ensure compliance. This may include updates to firewalls, patches, policy development, employee training, physical security, network configuration, etc.
  • Step 3: Test and Validate – verifies that all technology and physical security aspects are working properly. A penetration test may be necessary.
  • Step 4: Monitoring/Reporting – establishes ongoing monitoring and scanning of the required enterprise network. Creates a working process to log, remediate and report (as required) cyberattacks.

Get Started

For more information on Cybersecurity, contact Matt Minner, Senior Consultant, Technical Services